• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

8147 Courses

CompTIA Project+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Individuals in various job roles who are involved in leading, managing, and participating in small to medium scale projects. Overview Upon successful completion of this course, students will be able to: Identify the fundamentals of project management. Perform the pre-project setup. Initiate a project. Plan project strategies. Develop project schedules. Plan project staffing, communication, and quality. Plan project risk management. Plan project costs. Plan project procurements. Plan for change management and transitions. Manage project execution. Manage project procurement. Control project performance. Monitor and control the triple constraints. Monitor project risks and procurements. Perform the project closure processes. In this course, students will apply recognized practices of project management and understand a project?s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project. 1 - Exploring Project Management Fundamentals Examine the Basics of Project Management Describe the Project Life Cycle Examine Organizational Influences on Project Management 2 - Performing the Pre-Project Setup Create a Project Concept Definition Statement Examine Project Selection Determine Strategic and Operational Relevance Perform Project Feasibility Determine Technical Requirements 3 - Initiating a Project Prepare a Project Statement of Work Create a Project Charter Identify Project Stakeholders 4 - Planning Project Strategy Identify Elements of the Project Management Plan and Subsidiary Plans Determine Stakeholder Needs Create a Scope Statement Develop a Work Breakdown Structure 5 - Developing the Project Schedule Create an Activity List Create a Project Schedule Network Diagram Identify Resources Estimate Time Develop a Project Schedule Identify the Critical Path Optimize the Project Schedule Create a Schedule Baseline 6 - Planning Human Resources, Communication, and Quality Create a Human Resource Plan Create a Communications Management Plan Create a Quality Management Plan 7 - Planning Project Risk Management Examine a Risk Management Plan Identify Project Risks and Triggers Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Develop a Risk Response Plan 8 - Planning Project Costs Estimate Project Costs Estimate the Cost Baseline Reconcile Funding and Costs 9 - Planning Project Procurements Plan Project Procurements Prepare a Procurement Statement of Work Prepare a Procurement Document 10 - Planning for Change Management and Transitions Develop an Integrated Change Control System Develop a Transition Plan 11 - Managing Project Execution Direct Project Execution Execute a Quality Assurance Plan Assemble a Project Team Develop a Project Team Manage a Project Team Distribute Project Information Manage Stakeholder Relationships and Expectations 12 - Managing Project Procurement Obtain Responses from Sellers Determine Project Sellers 13 - Control Project Performance Monitor and Control Project Work Manage Project Changes Report on Project Performance 14 - Monitor and Control the Triple Constraints Control Project Scope Control Project Schedule Control Project Costs Manage Project Quality 15 - Monitoring Project Risks and Procurements Control Project Risks Managing Vendors and Procurements 16 - Performing the Project Closure Processes Deliver the Final Product Close Project Procurements Conduct a Closeout Meeting Close a Project Additional course details: Nexus Humans CompTIA Project Plus Certification (Exam PK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Project Plus Certification (Exam PK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Project+
Delivered Online
£2,475

Advanced Diploma Reflexology (Group)

By Renew Therapies Wellbeing Centre & Training Acdemy

Advanced level Reflexology course in Methley, Leeds

Advanced Diploma Reflexology (Group)
Delivered In-Person in Yorkshire
£925

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered in person or Online + more
£1,750

Diploma in Data Structure at QLS Level 5

4.5(3)

By Studyhub UK

Delve into the intricate world of 'Data Structure' with our comprehensive course, meticulously crafted for those who have a penchant for understanding the skeleton of software engineering. Data structures form the backbone of algorithmic efficiency, and mastering them is akin to holding the master key to software optimisation. Our course is a confluence of foundational knowledge and complex data structuring, ensuring that you emerge not only informed but also invigorated, ready to tackle any computational challenge thrown your way. Learning Outcomes Gain foundational understanding of different data structures and their implementations. Discover the intricate details of arrays, linked lists, stacks, and queues. Develop the ability to effectively utilise advanced structures like AVL trees and Fenwick trees. Master techniques for optimising algorithmic efficiency using suitable data structures. Enhance problem-solving skills related to data storage and retrieval. Why choose this Data Structure course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Diploma in Data Structure at QLS Level 5 Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Data Structure course for? Individuals keen on deepening their computer science foundations. Software developers aiming to optimise their code. Students pursuing computer science and related disciplines. Competitive coders desiring an edge in algorithm competitions. Tech enthusiasts eager to understand the underpinnings of efficient programming. Career path Software Developer: £25,000 - £45,000 Algorithm Engineer: £40,000 - £60,000 Data Scientist: £35,000 - £55,000 Backend Developer: £28,000 - £50,000 Systems Architect: £45,000 - £70,000 Data Engineer: £30,000 - £55,000 Prerequisites This Diploma in Data Structure at QLS Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Diploma in Data Structure at QLS Level 5 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £115 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Unit 01: Introduction Module 01: Promo Video 00:02:00 Module 02: Data Structure Introduction 00:05:00 Module 03: Computational Complexity Analysis 00:13:00 Unit 02: Arrays Module 01: Static and Dynamic Arrays 00:12:00 Module 02: Dynamic Arrays Source Code 00:07:00 Unit 03: Linked List Module 01: Singly and Doubly Linked Lists 00:15:00 Module 02: Doubly Linked Lists Source Code 00:10:00 Unit 04: Stack Module 01: Stack 00:12:00 Module 02: Stack Implementation 00:04:00 Module 03: Stack Source Code 00:04:00 Unit 05: Queues Module 01: Queues (Part-1) 00:06:00 Module 02: Queues (Part-2) 00:06:00 Module 03: Queue Source Code 00:04:00 Unit 06: Priority Queues (PQs) Module 01: Priority Queues (PQs) with an interlude on heaps 00:13:00 Module 02: Turning Min PQ into Max PQ 00:06:00 Module 03: Adding Elements to Binary Heap 00:10:00 Module 04: Removing Elements from Binary Heap 00:14:00 Module 05: Priority Queue Binary Heap Source Code 00:16:00 Unit 07: Union Find Module 01: Disjoint Set 00:06:00 Module 02: Kruskal's Algorithm 00:06:00 Module 03: Union and Find Operations 00:11:00 Module 04: Path Compression Union Find 00:07:00 Module 05: Union Find Source Code 00:08:00 Unit 08: Binary Search Trees Module 01: Binary Trees and Binary Search Trees (BST) 00:13:00 Module 02: Inserting Element into a Binary Search Tree (BST) 00:06:00 Module 03: Removing Element from a Binary Search Tree (BST) 00:14:00 Module 04: Tree Traversals 00:12:00 Module 05: Binary Search Source Code 00:13:00 Unit 09: Fenwick Tree Module 01: Fenwick Tree Construction 00:06:00 Module 02: Point Updates 00:05:00 Module 03: Binary Indexed Tree 00:14:00 Module 04: Fenwick Tree Source Code 00:06:00 Unit 10: Hash Tables Module 01: Hash Table 00:17:00 Module 02: Separate Chaining 00:08:00 Module 03: Separate Chaining Source Code 00:12:00 Module 04: Open Addressing 00:11:00 Module 05: Linear Probing 00:14:00 Module 06: Quadratic Probing 00:09:00 Module 07: Double Hashing 00:15:00 Module 08: Removing Element Open Addressing 00:08:00 Module 09: Open Addressing Code 00:15:00 Unit 11: Suffix Array Module 01: Introduction 00:03:00 Module 02: The Longest Common Prefix (LCP) Array 00:03:00 Module 03: Using SA/LCP Array to Find Unique Substrings 00:05:00 Module 04: Longest Common Substring (LCS) 00:11:00 Module 05: Longest Common Substring (LCS) Full Example 00:07:00 Module 06: Longest Repeated Substring (LRS) 00:05:00 Unit 12: AVL Trees Module 01: Balanced Binary Search Trees (BBSTs) 00:09:00 Module 02: Inserting Elements into an AVL Tree 00:10:00 Module 03: Removing an AVL Tree 00:09:00 Module 04: AVL Tree Source Code 00:17:00 Unit 13: Indexed Priority Queue Module 01: Indexed Priority Queue (Part-1) 00:25:00 Module 02: Indexed Priority Queue Source Code 00:09:00 Unit 14: Sparse Tables Module 01: Sparse Table 00:26:00 Module 02: Sparse Table Source Code 00:07:00 Assignment Assignment - Diploma in Data Structure at QLS Level 5 04:00:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00

Diploma in Data Structure at QLS Level 5
Delivered Online On Demand13 hours 1 minutes
£10.99

Revit Structure Training - 15 Hours - Basic to Intermediate

By FirstScale Revit Consultant and Training

The Revit Structure Training is for 15 hours, £525, and it will cover from Introduction to Intermediate in small classes with only 1 people per class.

Revit Structure Training - 15 Hours - Basic to Intermediate
Delivered OnlineFlexible Dates
£525

Campfire Song Workshop - 1 Day

5.0(3)

By Josh Bowker

Write your own campfire song in a magical roundhouse with Josh Bowker, acclaimed folk songwriter and workshop leader.

Campfire Song Workshop - 1 Day
Delivered In-Person in Bristol + more
£50

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered Online
£3,495

SHRM-CP/SHRM-SCP Certification Preparation

By Nexus Human

Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SHRM-CP/SHRM-SCP Certification Preparation
Delivered Online
£3,475

ALS Recertification (One Day Course) - Moorfields Eye Hospital

5.0(3)

By Hunter Clinical Training

e-ALS ALS recertification

ALS Recertification (One Day Course) - Moorfields Eye Hospital
Delivered In-Person in London
£410

e-ALS (One Day Course) - Moorfields Eye Hospital, London

5.0(1)

By Hunter Clinical Training

One day e-ALS Course. The ALS course is designed for healthcare professionals who would be expected to apply the skills taught as part of their clinical duties.

e-ALS (One Day Course) - Moorfields Eye Hospital, London
Delivered In-Person in London + more
£420
1...56789...815